Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 53

  • @Marc_Dutroux
    @Marc_Dutroux 2 месяца назад +17

    I love how you break down complex topics for beginners. Your teaching style is excellent. Thanks, Sunny! Love from Belgium!

    • @Addy.j-q6e
      @Addy.j-q6e 26 дней назад

      Begium?😂😂😂

    • @Marc_Dutroux
      @Marc_Dutroux 26 дней назад +1

      @@Addy.j-q6e LoL *Belgium. That was a typo.

  • @grantco.421
    @grantco.421 13 дней назад

    Hands down the best course on the web. all of your tutorials worked and I learned more about 4 way handshakes and cracking wifi passwords with you than i did in a 3 month bootcamp

  • @MrJohnsoncomputerscientist
    @MrJohnsoncomputerscientist 2 месяца назад +7

    Great video waiting for part 1.

  • @IA-xr8de
    @IA-xr8de 2 месяца назад +6

    Thank you Bro for this course. You have amazing content.

  • @samidew5092
    @samidew5092 2 месяца назад +1

    First time tutorial watching without feeling bored😊

  • @ibnfirnaas5963
    @ibnfirnaas5963 2 месяца назад +7

    Thanks for this course.

  • @StephensIfeoma
    @StephensIfeoma Месяц назад +1

    Well done I really appreciate you I like the way teach hope to see more of your videos

  • @DanmasaniAbdulrahmanBalarabe
    @DanmasaniAbdulrahmanBalarabe Месяц назад

    Fantastic ! Really your instructions are excellent and clear to reach the goal . Thank you Sir for the good contribution of the Knowledge .

  • @evertondeoliveirasoares2406
    @evertondeoliveirasoares2406 7 дней назад

    Subject: Questions about IDOR and Bug Bounty
    Hi , hope you're doing well!
    I'm a beginner in pentesting and bug bounty hunting, and I recently started studying IDOR (Insecure Direct Object Reference) and Access Control through PortSwigger's labs. A friend recommended this path as it's often easier to find these vulnerabilities and generate some income.
    I would like to ask for some practical tips:
    1. What is the best approach to finding IDOR vulnerabilities in real-world programs?
    2. What mindset or steps should I adopt when analyzing applications?
    3. Do you have any recommendations for tools or methods that I could start incorporating right away?
    Thank you very much for any insights you can share. Your content has been extremely helpful on this journey!

    • @SunnyDimalu
      @SunnyDimalu  6 дней назад +1

      to find IDOR vulnerabilities, explore every feature of the application. Test endpoints, forms, and actions where IDs, parameters are used. Manipulate inputs by changing IDs and values you shouldn't have access to and observe the outcome.
      The best way to learn is through practice. Cybersecurity and bug bounty hunting are practical fields-the more you practice, the better you become. There are no shortcuts.
      Use tools like Burp Suite, FFUF, and OWASP ZAP; they are excellent for capturing and manipulating requests. use FFUF . it is an excellent fuzzer.
      Peform Capture The Flag (CTF) challenges on platforms like Hack The Box, PortSwigger Academy, or TryHackMe, which offer practical exercises on IDOR and other vulnerabilities.

  • @alharosh
    @alharosh 2 месяца назад +6

    one world, bless you

  • @MiladWaskout
    @MiladWaskout Месяц назад

    Thanks mate! I learned a lot

  • @studyserenity-f2b
    @studyserenity-f2b 2 месяца назад

    well well .. this video is way more helpful then ever .. And the way of teaching is understandable ..i like it and impatiently waiting for the next part 😶‍🌫 Please Sir! don't forget to upload other parts 👍 i want some advance learning after this 👏

  • @uyoume2227
    @uyoume2227 18 дней назад

    Many thanks fine Sir 🍒

  • @AhmadAhmad-gh5op
    @AhmadAhmad-gh5op 15 дней назад

    gure jee, super way to explaing

  • @sp-vs5uc
    @sp-vs5uc Месяц назад

    Great video Boss. From Bangladesh ❤

  • @anvayashakti2374
    @anvayashakti2374 25 дней назад

    Thank you Sir ❤

  • @mingosutu
    @mingosutu Месяц назад

    Wery wery nice wideo. Keep up the good vork.

  • @MichaelOseiAppiah
    @MichaelOseiAppiah 2 месяца назад

    Hi Sunny, your teaching style is very cool. Do you have a full course in Application Security engineer. I want to be an Application security engineer

  • @mashalch
    @mashalch Месяц назад

    Keep up the good work

  • @egwuonwunelsononuchukwu
    @egwuonwunelsononuchukwu 22 дня назад

    sir, thanks a lot. could you please mentor me on this carrer path. am just a beginner ?

  • @harrypercyvale123
    @harrypercyvale123 8 дней назад

    hi, many thanks for your educational course. i have connected a wireless local area network "tp W-C-D band AC600. the USB light is on and it is connected however no matter what i do Kali "device" shows no USB is connected!? can you help?

    • @SunnyDimalu
      @SunnyDimalu  8 дней назад

      To use a wireless adapter in a Kali Linux virtual machine, you first need to add it to Kali. Connect it to your system, then go to Devices -> USB, and select your adapter from the list.

    • @harrypercyvale123
      @harrypercyvale123 8 дней назад

      thanks for your quick response. how do i add it to kali? please elaborate.

    • @SunnyDimalu
      @SunnyDimalu  8 дней назад +1

      Steps) Connect your adaptor to your system, then go to Devices(it is at the top - Menu bar of your Virtual machine) click on USB, and there you will a list of connected devices then select your adapter from the list.

    • @harrypercyvale123
      @harrypercyvale123 8 дней назад

      @SunnyDimalu , sorry mate, this is the issue. I get the message no USB is connected.

    • @SunnyDimalu
      @SunnyDimalu  8 дней назад

      Hello dear, it's very difficult for me to diagnose the issue without knowing more details, such as the version of VirtualBox, the operating system, and whether your card is compatible with Kali Linux.

  • @mbrowne8166
    @mbrowne8166 7 дней назад

    Hello, is there a way of removing verification from internet email

    • @SunnyDimalu
      @SunnyDimalu  7 дней назад

      Your question is not clear to me. Please be derailed and specific

  • @IndustryOfMagic
    @IndustryOfMagic 2 месяца назад

    Good work bro

  • @Net-Guru
    @Net-Guru 2 месяца назад

    Nice video

  • @eloncole5702
    @eloncole5702 15 дней назад

    Can we track the lost phone with IMEI number 😢

    • @SunnyDimalu
      @SunnyDimalu  14 дней назад +3

      It is technically possible under specific circumstances. The best course of action is to file a police report if you suspect your phone has been stolen. Tracking a device requires resources, but the police may be able to use their tools to locate and potentially recover it.

  • @shabeel205
    @shabeel205 2 месяца назад

    Can I become hacker only use mobile android device ?

    • @SunnyDimalu
      @SunnyDimalu  Месяц назад +2

      You can learn a lot about theoretical concepts using a mobile device, but you'll need a computer for practical applications.

  • @TikritiXP
    @TikritiXP 2 месяца назад

    Goat

  • @errorgamer-m2j
    @errorgamer-m2j Месяц назад

    1:35:34

  • @errorgamer-m2j
    @errorgamer-m2j Месяц назад

    30:49

  • @ravi-k8s7r
    @ravi-k8s7r День назад

    Hindi language sir

  • @SophyTiffany-r7g
    @SophyTiffany-r7g 2 месяца назад

    Moore Larry Allen Daniel Anderson Mary